WO2018205860A1 - 近场触发功能的实现方法及装置 - Google Patents

近场触发功能的实现方法及装置 Download PDF

Info

Publication number
WO2018205860A1
WO2018205860A1 PCT/CN2018/085018 CN2018085018W WO2018205860A1 WO 2018205860 A1 WO2018205860 A1 WO 2018205860A1 CN 2018085018 W CN2018085018 W CN 2018085018W WO 2018205860 A1 WO2018205860 A1 WO 2018205860A1
Authority
WO
WIPO (PCT)
Prior art keywords
preset
electronic device
function
range
trigger
Prior art date
Application number
PCT/CN2018/085018
Other languages
English (en)
French (fr)
Inventor
任爱松
李文龙
Original Assignee
阿里巴巴集团控股有限公司
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by 阿里巴巴集团控股有限公司 filed Critical 阿里巴巴集团控股有限公司
Publication of WO2018205860A1 publication Critical patent/WO2018205860A1/zh

Links

Images

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W4/00Services specially adapted for wireless communication networks; Facilities therefor
    • H04W4/02Services making use of location information
    • GPHYSICS
    • G07CHECKING-DEVICES
    • G07CTIME OR ATTENDANCE REGISTERS; REGISTERING OR INDICATING THE WORKING OF MACHINES; GENERATING RANDOM NUMBERS; VOTING OR LOTTERY APPARATUS; ARRANGEMENTS, SYSTEMS OR APPARATUS FOR CHECKING NOT PROVIDED FOR ELSEWHERE
    • G07C1/00Registering, indicating or recording the time of events or elapsed time, e.g. time-recorders for work people
    • G07C1/10Registering, indicating or recording the time of events or elapsed time, e.g. time-recorders for work people together with the recording, indicating or registering of other data, e.g. of signs of identity
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W24/00Supervisory, monitoring or testing arrangements
    • H04W24/08Testing, supervising or monitoring using real traffic
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W4/00Services specially adapted for wireless communication networks; Facilities therefor
    • H04W4/02Services making use of location information
    • H04W4/021Services related to particular areas, e.g. point of interest [POI] services, venue services or geofences
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W4/00Services specially adapted for wireless communication networks; Facilities therefor
    • H04W4/80Services using short range communication, e.g. near-field communication [NFC], radio-frequency identification [RFID] or low energy communication

Definitions

  • the present application relates to the field of near field communication technologies, and in particular, to a method and an apparatus for implementing a near field trigger function.
  • the management needs to perform setting operations on the attendance device, such as recording the information of the group member into the attendance device, but the interaction mode supported by the attendance device is very simple and the operation function is limited, resulting in The setup process is extremely cumbersome and lengthy, and is prone to errors.
  • the related art adds a Bluetooth communication function for the attendance device, so that the attendance device can transmit the Bluetooth signal in the near field range, and the management personnel receive the Bluetooth signal by using an electronic device such as a mobile phone or a tablet, based on the Bluetooth signal strength. Determining the distance between the electronic device and the attendance device, and actively popping the setting page for the attendance device on the electronic device when the distance is less than the preset trigger distance, so that the administrator can efficiently implement the attendance on the electronic device. Device setup operation.
  • the above-mentioned near field communication technologies such as Bluetooth also have certain drawbacks.
  • the attendance device transmits the Bluetooth signal
  • the boundary of the Bluetooth signal is likely to fluctuate, and the sensitivity of different electronic devices to the Bluetooth signal is also different, resulting in the electronic device of the manager not being able to accurately and stably identify.
  • the above distance In particular, when the distance measured by the electronic device repeatedly fluctuates around the preset trigger distance described above, even if the administrator is actually located near the attendance device, the electronic device may be misjudged as the manager repeatedly approaching and staying away from the attendance device. The electronic device repeatedly pops up the above setting page, affecting the setting operation of the manager, resulting in reduced efficiency or setting error of the setting operation.
  • the present application provides a method and a device for implementing a near field trigger function, which can ensure the smooth implementation of the near field trigger function and avoid the error of the near field trigger function when the ranging accuracy is low. trigger.
  • a method for implementing a near field trigger function including:
  • the preset function is triggered when the electronic device is continuously in the preset protection range, where the preset protection range is greater than the preset trigger range.
  • an apparatus for implementing a near field trigger function including:
  • a triggering unit that triggers a preset function when the electronic device enters the preset trigger range for the first time in a period in which the electronic device is continuously in the preset protection range, wherein the preset protection range is greater than the preset Set the trigger range.
  • a method for implementing a near field trigger function including:
  • the preset function is triggered when the electronic device is within the preset protection range and when the electronic device enters the preset trigger range for the first time, wherein the preset protection range is greater than the preset trigger range.
  • an apparatus for implementing a near field trigger function including:
  • the triggering unit triggers the preset function when the electronic device is within the preset protection range and when the electronic device enters the preset trigger range for the first time, wherein the preset protection range is greater than the preset trigger range.
  • a method for implementing a near field trigger function including:
  • a function setting interface for the attendance device is displayed on the electronic device, wherein the preset The protection range is greater than the preset trigger range.
  • an apparatus for implementing a near field trigger function including:
  • a display unit where the electronic device is within the preset protection range and when the electronic device enters the preset trigger range for the first time, displaying a function setting interface for the attendance device on the electronic device, where The preset protection range is greater than the preset trigger range.
  • the present application sets the preset protection range and the preset trigger range simultaneously around the beacon device, and only enters the preset trigger range for the first time in the time period in which the electronic device is continuously within the preset protection range.
  • the preset function is triggered, so that even if the distance detected by the electronic device fluctuates, the misjudgment of the electronic device can be reduced or eliminated, and the preset function related to the beacon device can be repeatedly triggered.
  • FIG. 1 is a schematic structural diagram of a near field communication system according to an exemplary embodiment of the present application.
  • FIG. 2 is a schematic structural diagram of another near field communication system according to an exemplary embodiment of the present application.
  • FIG. 3 is a flowchart of a method for implementing a near field trigger function according to an exemplary embodiment of the present application
  • FIG. 4 is a flowchart of setting up an attendance device according to an exemplary embodiment of the present application.
  • FIG. 5 is a schematic diagram of an attendance device according to an exemplary embodiment of the present application.
  • FIG. 6 is a schematic diagram of a relative positional relationship between a mobile phone and an attendance device according to an exemplary embodiment of the present application.
  • FIG. 7 is a schematic diagram showing a relative positional relationship between another mobile phone and an attendance device according to an exemplary embodiment of the present application.
  • FIG. 8 is a schematic diagram showing still another relative position relationship between a mobile phone and an attendance device according to an exemplary embodiment of the present application.
  • FIG. 9 is a schematic diagram of a display interface of a user client according to an exemplary embodiment of the present application.
  • FIG. 10 is a schematic diagram showing a relative positional relationship between a mobile phone and an attendance device according to a second embodiment of the present application.
  • FIG. 11 is a schematic diagram of another display interface of a user client according to an exemplary embodiment of the present application.
  • FIG. 12 is a flowchart of another method for implementing a near field trigger function according to an exemplary embodiment of the present application.
  • FIG. 13 is a flowchart of still another method for implementing a near field trigger function according to an exemplary embodiment of the present application.
  • FIG. 14 is a schematic structural diagram of an electronic device according to an exemplary embodiment of the present disclosure.
  • FIG. 15 is a block diagram of an apparatus for implementing a near field trigger function according to an exemplary embodiment of the present application.
  • FIG. 16 is a block diagram of another apparatus for implementing a near field trigger function according to an exemplary embodiment of the present application.
  • FIG. 17 is a block diagram of still another apparatus for implementing a near field trigger function according to an exemplary embodiment of the present application.
  • FIG. 1 is a schematic structural diagram of a near field communication system according to an exemplary embodiment of the present application. As shown in FIG. 1, the system may include a beacon device such as the attendance device 11 and an electronic device such as the mobile phone 12.
  • a beacon device such as the attendance device 11
  • an electronic device such as the mobile phone 12.
  • the attendance device 11 transmits a near field signal based on near field communication technology.
  • the near field signal is a Bluetooth signal; of course, other near field communication technologies such as ZigBee, WIFI, RFID, etc., can also be applied to the present application, which is not limited in this application.
  • the device identification information of the attendance device 11 may be included in the near field signal to indicate that the sender of the near field signal is the attendance device 11.
  • the beacon device triggers the near field signal to indicate that the electronic device such as the mobile phone 12 triggers a preset function related to the beacon device after receiving the near field signal
  • the preset function related to the attendance device 11 may include The attendance function, the setting function of the attendance device, etc.; and the attendance device 11 is only one type of beacon device that can be used, for example, the beacon device can also be an access control device, and the preset function related to the access control device can include the access control device.
  • the function of opening, the setting function of the access control device, etc., of course, this application does not limit the device type of the beacon device.
  • the beacon device can run a program on the beacon device side of an application to implement related business functions of the application, for example, when the beacon device runs a program of the mobile group office platform, the mobile group office platform can be implemented.
  • the beacon device client enables the beacon device 11 to transmit a near field signal under the control of the beacon device client.
  • the handset 12 is just one type of electronic device that a user can use. In fact, users obviously can also use electronic devices such as tablet devices, notebook computers, PDAs (Personal Digital Assistants), wearable devices (such as smart glasses, smart watches, etc.), etc. This is a limitation.
  • the electronic device can run a client-side program of an application to implement related business functions of the application, for example, when the electronic device runs a program of the mobile group office platform, the mobile device can be implemented as the mobile device.
  • the user client of the group office platform enables the electrical device to detect the distance from the beacon device, trigger a preset function related to the beacon device, and the like.
  • the beacon device and the electronic device can also establish a wireless communication connection based on the near field communication technology, and the electronic device can perform wireless communication with the beacon device based on the wireless communication connection.
  • the mobile phone 12 can make the attendance device 11 record the corresponding attendance success information through wireless communication with the attendance device 11; or, when interacting with the attendance device
  • the mobile phone 12 can send the setting result to the attendance device 11 so that the attendance device 11 can configure the function according to the setting result.
  • the user client of the mobile enterprise office platform is taken as an example (the same applies to other clients such as the beacon device client on the beacon device), and the application of the user client can be pre-installed on the electronic device such as the mobile phone 12
  • the user client can be launched and run on the mobile phone 12; of course, when an online "client” such as HTML5 technology is employed, the corresponding application can be obtained and run without installing the corresponding application on the mobile phone 12.
  • User client is taken as an example (the same applies to other clients such as the beacon device client on the beacon device), and the application of the user client can be pre-installed on the electronic device such as the mobile phone 12
  • the user client can be launched and run on the mobile phone 12; of course, when an online "client” such as HTML5 technology is employed, the corresponding application can be obtained and run without installing the corresponding application on the mobile phone 12.
  • User client is taken as an example (the same applies to other clients such as the beacon device client on the beacon device), and the application of the user client can be pre-installed
  • FIG. 2 is a schematic structural diagram of another near field communication system according to an exemplary embodiment of the present application.
  • the system may include a beacon device such as a server 21, a network 22, a mobile phone 23, and the like, and an attendance device 24.
  • the server 21 may be a physical server including a separate host, or the server 21 may be a virtual server hosted by the host cluster, or the server 21 may be a cloud server.
  • the server 21 can run a server-side program of an application to implement related business functions of the application. For example, when the server 21 runs the program of the mobile group office platform, the mobile group can be implemented. The server side of the platform.
  • Network 22 may include multiple types of wired or wireless networks.
  • the network 22 may include a Public Switched Telephone Network (PSTN) and the Internet.
  • PSTN Public Switched Telephone Network
  • a beacon device such as an electronic device such as a mobile phone 23 or an attendance device 24 can communicate with the server 21 via the network 22, respectively.
  • the electronic device such as the mobile phone 23 does not have to establish a wireless communication connection with the beacon device such as the attendance device 24, and only needs to transmit the near field signal by the beacon device, and the electronic device can receive the near field signal.
  • the attendance device 24 when the preset function related to the attendance device 24 is the setting function, the mobile phone 23 can upload the setting result to the server 21 through the network 22, and the setting result or the configuration based on the setting result by the server 21.
  • the instructions are pushed to the time and attendance device 24 via the network 22 to allow the attendance device 24 to functionally configure itself according to the settings or configuration instructions.
  • the mobile enterprise office platform in this application is a comprehensive platform, which can not only realize the communication function, but also serve as an integrated function platform for many other functions, such as approval events (such as leave, office application).
  • approval events such as leave, office application.
  • the handling of internal events such as approvals, financial events, etc., attendance events, mission events, log events, etc., such as ordering, purchasing, and other external events of the enterprise, this application does not limit this.
  • the beacon device client of the mobile enterprise office platform running on the attendance device 11 or the attendance device 24 described above can implement the attendance function, that is, process the attendance event described above.
  • the mobile enterprise office platform can be carried in instant messaging applications in related technologies, such as enterprise instant messaging (EIM) applications, such as Skype For. Microsoft Wait.
  • EIM enterprise instant messaging
  • the instant messaging function is only one of the communication functions supported by the mobile enterprise office platform.
  • the enterprise office platform can also implement more functions such as the above, and will not be described here.
  • the method mainly relates to receiving the near field signal by the electronic device after the beacon device transmits the near field signal. Processing, the processing logic of the electronic device will be described below with reference to FIG. 3.
  • FIG. 3 is a flowchart of a method for implementing a near field trigger function according to an exemplary embodiment of the present application. As shown in FIG. 3, the method is applied to an electronic device, and may include the following steps:
  • Step 302 Determine whether the electronic device enters a preset protection range around the beacon device.
  • the electronic device may receive a near field signal transmitted by the beacon device, and determine a distance between the electronic device and the beacon device according to a signal strength of the near field signal, and Determining whether the electronic device enters the pre-determination according to the distance and the protection distance corresponding to the preset protection range and the trigger distance corresponding to the preset trigger range. Set the protection range or the preset trigger range.
  • the signal strength may be an RSSI (Received Signal Strength Indication) value measured by the electronic device, and calculated between the electronic device and the beacon device according to a conversion formula between the predefined RSSI value and the distance. the distance.
  • the preset protection range is greater than the preset trigger range, and the preset protection range forms a circle of “safe range” on the periphery of the preset trigger range, even if the distance detected by the electronic device fluctuates, as long as The fluctuation does not exceed the preset protection range, and will not affect the actual processing process. For example, the electronic device does not repeatedly trigger the preset function related to the beacon device.
  • the electronic device When the user (such as a manager) does need to trigger the preset function related to the beacon device, the electronic device must be placed within the preset trigger range, thereby ensuring the difference between the preset protection range and the preset trigger range.
  • the distance not less than the maximum fluctuation distance of the distance detected by the electronic device, ensures that the numerical fluctuation of the distance does not cause the electronic device to be misjudged completely, and completely avoids the electronic device repeatedly triggering the preset function related to the beacon device.
  • the preset protection range is a circular area with the beacon device's installation position as the center and r1 as the radius.
  • the preset trigger range is a circular area with the beacon device's installation position as the center and r2 as the radius.
  • the maximum fluctuation distance that the electronic device can generate is k
  • the preset protection range is not fluctuated, and the electronic device is prevented from being mistakenly judged to re-enter the preset protection range, and the above-mentioned preset function is repeatedly triggered.
  • Step 304 When the electronic device enters the preset trigger range for the first time, the preset function is triggered when the electronic device is continuously in the preset protection range.
  • whether the electronic device enters the preset trigger range for the first time in the time period may be determined by: when the electronic device enters the preset protection range from the outside, the function is The triggering state is set to be triggerable; when the electronic device enters the preset triggering range, if the function triggering state is triggerable, determining that the electronic device enters the preset trigger for the first time in the time period Range and switching the function trigger state to untriggerable, thereby ensuring that the electronic device can only trigger the beacon device when entering the preset trigger range for the first time in each time period in which the electronic device is continuously within the preset protection range.
  • the preset function avoids repeated triggering of the preset function.
  • the preset function may be triggered by the electronic device, or may be triggered by a preset application running on the electronic device; for example, the preset application may be a client of the mobile enterprise office platform. End program.
  • the preset function may include a function related to the beacon device.
  • the beacon device may have no associated function, but only trigger the preset function.
  • the electronic device may display a function triggering interface for the beacon device.
  • the function triggering interface may be an attendance triggering interface, so that the user can trigger The attendance triggers the interface and completes the attendance operation.
  • the electronic device may display a function setting interface for the beacon device to perform function setting on the beacon device.
  • the function setting interface may be used to input a person who needs attendance. information.
  • an entry option of a preset function related to the beacon device may be displayed on the electronic device; wherein, when the user of the entry option triggers an operation, the preset function related to the beacon device may be switched between the startup state and the suspended state. Then, even if the preset function related to the beacon device or its operation interface is closed due to some reasons (such as user misoperation, automatic fluctuation of the electronic device to the preset trigger range, etc.), the user can also By triggering the entry option, a quick call to the preset function or its operation interface is implemented, which helps to improve the user's operation efficiency.
  • the present application sets the preset protection range and the preset trigger range simultaneously around the beacon device, and only enters the preset trigger range for the first time in the time period in which the electronic device is continuously within the preset protection range.
  • the preset function is triggered, so that even if the distance detected by the electronic device fluctuates, the misjudgment of the electronic device can be reduced or eliminated, and the preset function related to the beacon device can be repeatedly triggered.
  • the technical solution of the present application is described below with reference to the technical architecture of the near field communication system shown in FIG. 2, taking the enterprise instant messaging application “Enterprise WeChat” as an example. It is assumed that the user client running the enterprise WeChat on the mobile phone 23, the beacon device client running the enterprise WeChat on the attendance device 24, and the server running the enterprise WeChat on the server 21, wherein the user clients on the mobile phone 23 are respectively registered.
  • the registered account of the different user for example, the registered account of the manager is registered on the mobile phone 23, so that the mobile phone 23 is configured as a management device corresponding to the management personnel.
  • the administrator can perform functions and the like on the attendance device 24 through the mobile phone 23. The specific process will be described in detail below with reference to FIG. 4.
  • FIG. 4 is a flow chart of setting up an attendance device according to an exemplary embodiment of the present application. As shown in FIG. 4, the process may include the following steps:
  • Step 402 the attendance device 24 sends an activation code acquisition request to the server 21.
  • step 404 the server 21 assigns an activation code to the attendance device 24.
  • the attendance device 24 after the attendance device 24 is powered on, it can check whether there is an activation code in the storage space; if it exists, it can directly go to step 406B, otherwise, an activation code acquisition request can be sent to the server 21, so that the server 21 can send the attendance device to the attendance device. 24 assigns a unique corresponding activation code. Since the activation code uniquely corresponds to the attendance device 24, the activation code can be used as the identification information of the attendance device 24.
  • the attendance device 24 can save the activation code to the storage space, and the activation code is always applied thereafter.
  • the attendance device 24 may actively aging the obtained activation code according to a preset period and request a new activation code from the server 21, and the server 21 may use the new activation code to replace the old activation code (ie, the aging activation).
  • the code for example, updates the correspondence between the activation code described below and the attendance device 24.
  • step 406A the server 21 stores the correspondence between the attendance device 24 and the activation code.
  • the activation code acquisition request sent by the attendance device 24 may include the MAC address of the attendance device or the like as the ID information of the attendance device, so that the server 21 may be in the ID information and the assigned activation code. Establish a correspondence between them.
  • the activation code may be written into the attendance device 24 in advance, and the correspondence between the activation code and the attendance device 24 is stored in the server 21, then the attendance is performed.
  • the device 24 can directly read and apply the activation code without requesting the server 21 to obtain the activation code through the above steps.
  • step 406B the attendance device 24 displays the activation code.
  • the activation code may be the two-dimensional code 240 (or other form of graphic code) shown in FIG. 5, and the attendance device 24 may directly display the two-dimensional code 240.
  • the activation code may be a set of strings or other forms of non-graphical information, and the attendance device 24 may directly display the string, or convert the string, and display the converted image as shown in FIG. QR code 240 and so on.
  • the activation code can also take other forms, and the attendance device 24 can also display the activation code in more ways, which is not limited in this application.
  • step 408 the handset 23 reads the activation code from the attendance device 24.
  • the user client of the enterprise WeChat is installed on the mobile phone 23, and the user client can read the activation code displayed on the attendance device 24 by acquiring the identification information displayed by the attendance device 24, and the server 21 has already stored the activation code. Correspondence between the identification information and the attendance device 24.
  • the camera component on the mobile phone 23 can be activated to collect the graphic code through the “scan code” function provided by the user client, and then the content is collected.
  • the content of the activation code is read and recognized; for example, by reading the two-dimensional code 240 shown in FIG. 5, it can be recognized that the activation code corresponding to the two-dimensional code 240 is "gfd1s5g451f24sg54sg241fd1".
  • the camera component on the mobile phone 23 can be started to collect the character string through the related function provided by the user client, and then passed through, for example, OCR. (Optical Character Recognition, etc.) recognizes the character string.
  • OCR Optical Character Recognition
  • the user client can also show the input box, so that the user can manually input the character string shown on the attendance device 24 into the mobile phone 23 to help the mobile phone 23 complete the reading operation on the character string.
  • step 410 the server 21 receives the binding request sent by the mobile phone 23, and the binding request includes an activation code.
  • step 412 the server 21 establishes a binding relationship between the mobile phone 23 and the attendance device 24.
  • the mobile phone 23 may send a binding request for the identification information to the server 21, and the server 21 extracts the identification information included in the binding request, and determines that the identification information corresponds according to the correspondence stored in step 406A.
  • the attendance device 24 then establishes a binding relationship between the attendance device 24 and the handset 23.
  • mobile phone 23 can be narrowly regarded as a physical user equipment, for example, by the MAC address of the user equipment, etc., or the “mobile phone 23" can be generally regarded as having a corresponding login.
  • Any electronic device that registers an account For ease of understanding, the following is an example of binding the attendance device 24 to the registered account as an example.
  • Step 414 after the binding is successful, the mobile phone 23 can set the notification frame parameter of the attendance device 24, and the server 21 configures the announcement frame parameter of the attendance device 24 according to the setting result.
  • step 416 the attendance device 24 transmits an announcement frame message according to the configured advertisement frame parameter.
  • the attendance device 24 adopts the Bean technology-based ibeacon protocol, and the near field signal transmitted by the attendance device 24 may be an advertisement message.
  • the announcement frame parameter may include: device identification information of the attendance device 24 and message transmission parameters.
  • the device identification information is used to enable the sender of the advertisement frame message to be the attendance device 24 according to the receipt of the advertisement frame message, such as the mobile phone 23; for example, the device identification information may be included in the UUID included in the advertisement frame message ( Universally Unique Identifier (Universal Unique Identifier), Major (Master Parameter), and Minor (Subparameter).
  • the message transmission parameter is used to indicate how the attendance device 24 transmits the advertisement frame message.
  • the message transmission parameter may include a transmission power, a transmission period, and the like. The transmission power may control the coverage of the advertisement frame message, and the transmission period may control the advertisement frame. The frequency at which the message is transmitted.
  • the administrator can configure the announcement frame parameter of the attendance device 24 in the process of activating the attendance device 24; of course, the administrator can also configure the advertisement frame parameter at other times.
  • the announcement frame parameters of the attendance device 24 can be configured by other users. In fact, even if the factory default configuration of the attendance device 24 is directly employed, the use of the attendance device 24 is not affected.
  • Step 418 when the manager carries the mobile phone 23 to the vicinity of the attendance device 24, the mobile phone 23 can receive the announcement frame message transmitted by the attendance device 24.
  • step 420 the handset 23 identifies the sender of the announcement frame message.
  • the user client of the enterprise WeChat running on the mobile phone 23 can parse the advertisement frame message received by the mobile phone 23. Then, the user client can identify that the sender of the advertisement frame message is the attendance device 24 according to the values of the UUID, Major, Minor, and the like included in the advertisement frame message.
  • the local area of the user client may store the device identification information corresponding to all the attendance devices with the administrative authority of the management personnel, so that the user client can locally identify the sender of the advertisement frame message as the attendance device 24; or, the user client
  • the device identification information in the announcement frame message may be transmitted to the server 21, and the recognition result returned by the server 21 is received.
  • step 422 the handset 23 determines the distance between itself and the attendance device 24.
  • the RSSI value, A is the RSSI value when the transmitting end and the receiving end of the announcement frame message are at a distance of 1 meter
  • n is an environmental attenuation factor. In short, the distance should be negatively correlated with the RSSI value.
  • step 424 the mobile phone 23 determines whether the predefined condition is met, and automatically pops up the setting window for the attendance device 24 when satisfied.
  • a plurality of ranges can be formed around the attendance device 24; as shown in FIG. 6, the method includes: a preset protection range 61 with the installation position of the attendance device 24 as a center and a preset protection distance r1 as a radius, for attendance
  • the installation position of the device 24 is a preset trigger range 62 with a center and a preset trigger distance r2 as a radius, where r1>r2, that is, the coverage of the preset protection range 61 is greater than the preset trigger range 62.
  • the transmit power of the announcement frame message should be such that its own coverage is at least greater than the preset protection range 61, and the mobile phone 23 can be based on the preset protection range 61, the preset trigger range 62, and the like. Determine if the predefined conditions are met.
  • the handset 23 receives an announcement frame message at a location other than the preset protection range 61, assuming that the actual distance between the handset 23 and the attendance device 24 is now d1.
  • the distance calculated by the mobile phone 23 may have a certain deviation a, so that the self-position calculated by the mobile phone 23 may be in the manner shown in FIG.
  • the corresponding detection distance belongs to the interval [d1-a, d1+a].
  • the mobile phone 23 When the mobile phone 23 is further moved toward the attendance device 24, it is assumed that the mobile phone 23 moves to the position shown in FIG. 7, that is, the mobile phone 23 is actually located within the preset protection range 61, but the fluctuation range 63 of the mobile phone 23 is not completely at the preset.
  • the partial area Within the protection range 61, the partial area is located outside the preset protection range 61, so that the distance detected by the mobile phone 23 may result in the following two results: (1) outside the preset protection range 61, and (2) preset.
  • the above-mentioned predefined condition is that the mobile phone 23 enters the preset trigger range 62 for the first time in each time period in which the preset protection range 61 is continuously. Then, for the embodiment shown in FIG. 7, when the mobile phone 23 detects that the result (1) is switched to the result (2) at the time T1, it indicates that the mobile phone 23 enters the preset protection range 61, then until the mobile phone When the result (2) is switched back to the result (1) at the time T2, that is, in the time period between the time T1 and the time T2, if the mobile phone 23 first enters the preset trigger range 62, it is determined that the mobile phone 23 is satisfied.
  • the mobile phone 23 is always unable to enter the preset trigger range 62, so that the above predefined conditions are not satisfied, and the setting is not triggered. window.
  • the mobile phone 23 is further close to the attendance device 24, as shown in FIG. 8, it is assumed that at least a part of the fluctuation range 63 of the mobile phone 23 enters the preset trigger range 62, and the mobile phone 23 determines that it has entered the preset trigger range according to the detected distance.
  • the mobile phone 23 if the mobile phone 23 enters the preset trigger range 62 for the first time in the same time period, it can be determined that the mobile phone 23 satisfies the above predefined conditions, so that the mobile phone 23 can be displayed on the display interface 91 of the user client shown in FIG.
  • the setting window 92 is automatically popped up to set the attendance device 24 by the manager.
  • the distance detected by the handset 23 may result in two outcomes: (2) within the preset protection range 61, outside of the preset trigger range 62, and (3) within the preset trigger range 62. Then, after determining that the mobile phone 23 is in the first result (3), the mobile phone 23 can automatically pop up the above setting window 92; and the mobile phone 23 may switch back and forth between the above result (3) and the result (2), as if the mobile phone 23 is constantly changing.
  • the mobile phone 23 switches to the result (2) except that it is determined to be the result (3) for the first time.
  • the result of the result (3) is determined to not satisfy the above-mentioned predefined conditions, so that the setting window 92 is not frequently popped up, and the setting operation of the attendance device 24 by the manager is not affected.
  • the preset protection range 61 and the preset trigger range 62 should be appropriately set according to the fluctuation range 63 of the mobile phone 23.
  • a part of the fluctuation range 63 is located in the preset trigger range 62 (which is necessarily located in the preset protection range 61 at this time), and a part is located outside the preset protection range 61, resulting in the mobile phone 23 It may be misjudged that it continuously enters the preset protection range 61 and the preset trigger range 62 from the outside, and moves from the preset trigger range 62 and the preset protection range 61 to the outside, causing the mobile phone 23 to misjudge that it repeatedly satisfies the above predefined The condition causes the setting window 92 to be repeatedly popped up on the mobile phone 23. Therefore, similar to the case shown in FIG. 7 and FIG.
  • the administrator may close the setting window 92 for some reasons, so that the manager may need to manually move the mobile phone 23 outside the preset protection range 61.
  • the preset trigger range 62 is then re-entered to pop up the settings window 92.
  • the manager may not be able or convenient to move the handset 23 into the preset protection range 61. In short, the above situation may cause inconvenience to managers. Therefore, when the electronic device is within the preset protection range 61, as shown in FIG. 11, the mobile phone 23 can display the entry option 1102 for the setting window 92 on the display interface 1101 of the user client, so that the manager can trigger the entry.
  • the setting window 92 can be called or the recalled setting window 92 can be closed to facilitate the operation of the manager.
  • the mobile phone 23 moves out of the preset protection range 61, the mobile phone 23 can hide the entry option 1102 to avoid misoperation by the administrator.
  • Step 426 the mobile phone 23 generates a user setting instruction for the attendance device 24 according to the detected user setting operation, and sends it to the server 21.
  • step 428 the server 21 configures the attendance device according to the user setting instruction.
  • the present application can accurately determine the operation intention of the manager by setting the preset protection range 61 and the preset trigger range 62, and the predefined conditions related to the two ranges, so that the mobile phone 23 cannot accurately detect the In the case of the distance between the attendance device 24 and the attendance device 24, it is still possible to ensure that the mobile phone 23 actively pops up the setting window 92 for the attendance device 24, and prevents the setting window 92 from being repeatedly popped up to prevent the management personnel from setting the operation of the attendance device 24. .
  • FIG. 12 is a flowchart of another method for implementing a near field trigger function according to an exemplary embodiment of the present application. As shown in FIG. 12, the method is applied to an electronic device and may include the following steps:
  • Step 1202 Determine whether the electronic device enters a preset protection range around the beacon device.
  • step 1202 may refer to step 302 in the embodiment shown in FIG. 3, and details are not described herein again.
  • Step 1204 The preset function is triggered when the electronic device is within the preset protection range and when the electronic device enters the preset trigger range for the first time, wherein the preset protection range is greater than the preset trigger range.
  • the electronic device when the electronic device is in the preset protection range, it indicates that the user of the electronic device has a high probability to trigger the preset function; and when the user enters the preset trigger range, the use may be determined. It is indeed desirable to trigger the preset function, so that when the user first enters the preset trigger range, the preset function is triggered, on the one hand, the user's willingness to trigger the preset function can be satisfied, and on the other hand, the pair can be avoided. Repeated triggering of this preset function.
  • FIG. 13 is a flowchart of still another method for implementing a near field trigger function according to an exemplary embodiment of the present application. As shown in FIG. 13, the method is applied to an electronic device, and may include the following steps:
  • Step 1302 Determine whether the electronic device enters a preset protection range around the attendance device.
  • step 1302 may refer to step 302 in the embodiment shown in FIG. 3, and replace only the beacon device in step 302 with the attendance device in step 1302, but the principles are the same, and are not described herein again. .
  • Step 1304 when the electronic device is within the preset protection range and when the electronic device enters the preset trigger range for the first time, displaying a function setting interface for the attendance device on the electronic device, where The preset protection range is greater than the preset trigger range.
  • the electronic device when the electronic device is in the preset protection range, it indicates that the user of the electronic device has a high probability to set the attendance device; and when the user enters the preset trigger range, the The user does not want to set the attendance device, so that when the user enters the preset trigger range for the first time, the function setting interface of the attendance device is popped up and displayed on the electronic device, and the user can satisfy the setting of the attendance device on the one hand. Will, on the other hand, can avoid repeated pop-ups of the function setting interface, to avoid affecting the user's normal operation of the function setting interface.
  • FIG. 14 shows a schematic structural diagram of an electronic device according to an exemplary embodiment of the present application.
  • the electronic device includes a processor 1402, an internal bus 1404, a network interface 1406, a memory 1408, and a non-volatile memory 1410, and may of course include hardware required for other services.
  • the processor 1402 reads the corresponding computer program from the non-volatile memory 1410 into the memory 1408 and then operates to form an implementation device of the near field trigger function on the logical level.
  • the present application does not exclude other implementation manners, such as a logic device or a combination of software and hardware, etc., that is, the execution body of the following processing flow is not limited to each logical unit, and may be Hardware or logic device.
  • the apparatus for implementing the near field trigger function may include:
  • the determining unit 1501 determines whether the electronic device enters a preset protection range around the beacon device
  • the triggering unit 1502 when the electronic device enters the preset triggering range for the first time, triggering the preset function, where the preset protection range is greater than the Preset trigger range.
  • the determining unit 1501 determines whether the electronic device enters the preset protection range or the preset trigger range by:
  • the trigger unit 1502 determines whether the electronic device enters the preset trigger range for the first time in the time period by:
  • the function trigger state is set to be triggerable
  • the function trigger state is triggerable, determining that the electronic device enters the preset trigger range for the first time in the time period, and the function is The trigger state is switched to untriggerable.
  • a distance between the preset protection range and the preset trigger range is not less than a maximum fluctuation distance of the distance.
  • the trigger unit 1502 is specifically configured to:
  • a function trigger interface or a function setting interface for the beacon device is displayed on the electronic device.
  • it also includes:
  • the displaying unit 1503 when the electronic device is in the preset protection range, displaying an entry option of a preset function related to the beacon device on the electronic device;
  • the switching unit 1504 when detecting a user-triggered operation for the entry option, performs switching control of the preset function related to the beacon device between an activated state and a suspended state.
  • the trigger unit 1502 is specifically configured to:
  • the preset function is triggered by the electronic device
  • the preset function is triggered by a preset application running on the electronic device.
  • the preset function includes: a function related to the beacon device.
  • the apparatus for implementing the near field trigger function may include:
  • the determining unit 1601 determines whether the electronic device enters a preset protection range around the beacon device
  • the triggering unit 1602 triggers a preset function when the electronic device is within the preset protection range and when the electronic device enters the preset trigger range for the first time, wherein the preset protection range is greater than the preset trigger range .
  • the determining unit 1601 determines whether the electronic device enters the preset protection range or the preset trigger range by:
  • the triggering unit 1602 determines whether the electronic device is in the preset trigger range for the first time when the electronic device is within the preset protection range:
  • the function trigger state is set to be triggerable
  • the function trigger state is triggerable, determining that the electronic device enters the preset trigger range for the first time when the electronic device is within the preset protection range, and The function trigger state is switched to be untriggerable.
  • a distance between the preset protection range and the preset trigger range is not less than a maximum fluctuation distance of the distance.
  • the trigger unit 1602 is specifically configured to:
  • a function trigger interface or a function setting interface for the beacon device is displayed on the electronic device.
  • it also includes:
  • the switching unit 160 when detecting a user-triggered operation for the entry option, performs switching control of the preset function related to the beacon device between an activated state and a suspended state.
  • the trigger unit 1602 is specifically configured to:
  • the preset function is triggered by the electronic device
  • the preset function is triggered by a preset application running on the electronic device.
  • the preset function includes: a function related to the beacon device.
  • the apparatus for implementing the near field trigger function may include:
  • the determining unit 1701 determines whether the electronic device enters a preset protection range around the attendance device
  • the display unit 1702 when the electronic device is in the preset protection range, and when the electronic device enters the preset trigger range for the first time, displaying a function setting interface for the attendance device on the electronic device, where The preset protection range is greater than the preset trigger range.
  • the determining unit 1701 determines whether the electronic device enters the preset protection range or the preset trigger range by:
  • the display unit 1702 determines whether the electronic device is in the preset trigger range for the first time when the electronic device is within the preset protection range:
  • the trigger state is triggerable, determining that the electronic device enters the preset trigger range for the first time when the electronic device is within the preset protection range, and The trigger state is switched to untriggerable.
  • a distance between the preset protection range and the preset trigger range is not less than a maximum fluctuation distance of the distance.
  • the display unit 1702 is further configured to: when the electronic device is in the preset protection range, display an entry option of the function setting interface on the electronic device;
  • the apparatus further includes: a switching unit 1703 that performs switching control between the display state and the hidden state when a user-triggered operation for the entry option is detected.
  • the display unit 1702 is specifically configured to:
  • the display of the function setting interface is triggered by the electronic device
  • the presentation of the function setting interface is triggered by a preset application running on the electronic device.
  • the system, device, module or unit illustrated in the above embodiments may be implemented by a computer chip or an entity, or by a product having a certain function.
  • a typical implementation device is a computer, and the specific form of the computer may be a personal computer, a laptop computer, a cellular phone, a camera phone, a smart phone, a personal digital assistant, a media player, a navigation device, an email transceiver, and a game control.
  • a computer includes one or more processors (CPUs), input/output interfaces, network interfaces, and memory.
  • processors CPUs
  • input/output interfaces network interfaces
  • memory volatile and non-volatile memory
  • the memory may include non-persistent memory, random access memory (RAM), and/or non-volatile memory in a computer readable medium, such as read only memory (ROM) or flash memory.
  • RAM random access memory
  • ROM read only memory
  • Memory is an example of a computer readable medium.
  • Computer readable media includes both permanent and non-persistent, removable and non-removable media.
  • Information storage can be implemented by any method or technology.
  • the information can be computer readable instructions, data structures, modules of programs, or other data.
  • Examples of computer storage media include, but are not limited to, phase change memory (PRAM), static random access memory (SRAM), dynamic random access memory (DRAM), other types of random access memory (RAM), read only memory. (ROM), electrically erasable programmable read only memory (EEPROM), flash memory or other memory technology, compact disk read only memory (CD-ROM), digital versatile disk (DVD) or other optical storage, Magnetic tape cartridges, magnetic tape storage or other magnetic storage devices or any other non-transportable media can be used to store information that can be accessed by a computing device.
  • computer readable media does not include temporary storage of computer readable media, such as modulated data signals and carrier waves.
  • first, second, third, etc. may be used to describe various information in this application, such information should not be limited to these terms. These terms are only used to distinguish the same type of information from each other.
  • first information may also be referred to as the second information without departing from the scope of the present application.
  • second information may also be referred to as the first information.
  • word "if” as used herein may be interpreted as "when” or “when” or “in response to a determination.”

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Physics & Mathematics (AREA)
  • General Physics & Mathematics (AREA)
  • Telephone Function (AREA)

Abstract

本申请提供一种近场触发功能的实现方法及装置,该方法可以包括:确定电子设备是否进入信标设备周围的预设保护范围;在所述电子设备连续处于所述预设保护范围的时间段内,当所述电子设备首次进入预设触发范围时,触发预设功能,其中所述预设保护范围大于所述预设触发范围。通过本申请的技术方案,可以在测距精准度较低的情况下,确保近场触发功能的顺利实现,并避免对该近场触发功能的误触发。

Description

近场触发功能的实现方法及装置
本申请要求2017年05月08日递交的申请号为201710317973.1、发明名称为“近场触发功能的实现方法及装置”的中国专利申请的优先权,其全部内容通过引用结合在本申请中。
技术领域
本申请涉及近场通讯技术领域,尤其涉及一种近场触发功能的实现方法及装置。
背景技术
在相关技术中,随着蓝牙、ZigBee等近场通讯技术的不断发展和应用,极大地提升了人们日常生活的便利性。举例而言,对于传统的考勤设备而言,管理人员需要在考勤设备上进行设置操作,比如将团体成员的信息录入考勤设备等,但是考勤设备所支持的交互方式十分单一、操作功能有限,造成设置过程极为繁琐和漫长,并且极易发生错误。
为此,相关技术中为考勤设备添加了蓝牙通讯功能,使得考勤设备可以向外发射近场范围内的蓝牙信号,而管理人员通过使用手机、平板等电子设备接收该蓝牙信号、基于蓝牙信号强度确定出该电子设备与考勤设备之间的距离,并在该距离小于预设触发距离时,在电子设备上主动弹出针对考勤设备的设置页面,使得管理人员可以在电子设备上高效地实现对考勤设备的设置操作。
但是,上述的蓝牙等近场通讯技术也存在一定缺陷。比如,考勤设备在向外发射蓝牙信号时,其蓝牙信号的边界容易产生波动,且不同电子设备对于蓝牙信号的感应灵敏度也存在一定差异,造成管理人员的电子设备并不能够精准、稳定地识别出上述的距离。尤其是,当电子设备测量出的距离反复在上述的预设触发距离附近波动时,即便管理人员实际上位于考勤设备附近,也可能造成电子设备误判为该管理人员反复靠近、远离考勤设备,使得电子设备反复弹出上述的设置页面,影响管理人员的设置操作,造成设置操作的效率降低或设置错误。
发明内容
有鉴于此,本申请提供一种近场触发功能的实现方法及装置,可以在测距精准度较低的情况下,确保近场触发功能的顺利实现,并避免对该近场触发功能的误触发。
为实现上述目的,本申请提供技术方案如下:
根据本申请的第一方面,提出了一种近场触发功能的实现方法,包括:
确定电子设备是否进入信标设备周围的预设保护范围;
在所述电子设备连续处于所述预设保护范围的时间段内,当所述电子设备首次进入预设触发范围时,触发预设功能,其中所述预设保护范围大于所述预设触发范围。
根据本申请的第二方面,提出了一种近场触发功能的实现装置,包括:
确定单元,确定电子设备是否进入信标设备周围的预设保护范围;
触发单元,在所述电子设备连续处于所述预设保护范围的时间段内,当所述电子设备首次进入预设触发范围时,触发预设功能,其中所述预设保护范围大于所述预设触发范围。
根据本申请的第三方面,提出了一种近场触发功能的实现方法,包括:
确定电子设备是否进入信标设备周围的预设保护范围;
在所述电子设备处于所述预设保护范围内并且当所述电子设备首次进入预设触发范围时,触发预设功能,其中所述预设保护范围大于所述预设触发范围。
根据本申请的第四方面,提出了一种近场触发功能的实现装置,包括:
确定单元,确定电子设备是否进入信标设备周围的预设保护范围;
触发单元,在所述电子设备处于所述预设保护范围内并且当所述电子设备首次进入预设触发范围时,触发预设功能,其中所述预设保护范围大于所述预设触发范围。
根据本申请的第五方面,提出了一种近场触发功能的实现方法,包括:
确定电子设备是否进入考勤设备周围的预设保护范围;
在所述电子设备处于所述预设保护范围内并且当所述电子设备首次进入预设触发范围时,在所述电子设备上展示出针对所述考勤设备的功能设置界面,其中所述预设保护范围大于所述预设触发范围。
根据本申请的第六方面,提出了一种近场触发功能的实现装置,包括:
确定单元,确定电子设备是否进入考勤设备周围的预设保护范围;
展示单元,在所述电子设备处于所述预设保护范围内并且当所述电子设备首次进入预设触发范围时,在所述电子设备上展示出针对所述考勤设备的功能设置界面,其中所述预设保护范围大于所述预设触发范围。
由以上技术方案可见,本申请通过在信标设备周围同时设置预设保护范围和预设触发范围,并且仅在电子设备连续处于预设保护范围内的时间段内、首次进入预设触发范围时触发预设功能,使得即便电子设备检测到的距离发生数值波动时,也可以降低或消 除电子设备的误判,避免反复触发与信标设备相关的预设功能。
附图说明
图1是本申请一示例性实施例提供的一种近场通讯系统的架构示意图;
图2是本申请一示例性实施例提供的另一种近场通讯系统的架构示意图;
图3是本申请一示例性实施例提供的一种近场触发功能的实现方法的流程图;
图4是本申请一示例性实施例提供的一种对考勤设备进行设置的流程图;
图5是本申请一示例性实施例提供的一种考勤设备的示意图;
图6是本申请一示例性实施例之一提供的一种手机与考勤设备之间的相对位置关系的示意图;
图7是本申请一示例性实施例之一提供的另一种手机与考勤设备之间的相对位置关系的示意图;
图8是本申请一示例性实施例之一提供的又一种手机与考勤设备之间的相对位置关系的示意图;
图9是本申请一示例性实施例提供的一种用户客户端的显示界面的示意图;
图10是本申请一示例性实施例之二提供的一种手机与考勤设备之间的相对位置关系的示意图;
图11是本申请一示例性实施例提供的另一种用户客户端的显示界面的示意图;
图12是本申请一示例性实施例提供的另一种近场触发功能的实现方法的流程图;
图13是本申请一示例性实施例提供的又一种近场触发功能的实现方法的流程图;
图14是本申请一示例性实施例提供的一种电子设备的结构示意图;
图15是本申请一示例性实施例提供的一种近场触发功能的实现装置的框图;
图16是本申请一示例性实施例提供的另一种近场触发功能的实现装置的框图;
图17是本申请一示例性实施例提供的又一种近场触发功能的实现装置的框图。
具体实施方式
图1是本申请一示例性实施例提供的一种近场通讯系统的架构示意图。如图1所示,该系统可以包括考勤设备11等信标设备和手机12等电子设备。
考勤设备11基于近场通讯技术向外发射近场信号。例如,采用蓝牙技术时,近场信号为蓝牙信号;当然,诸如ZigBee、WIFI、RFID等其他近场通讯技术,同样可以应用 于本申请,本申请并不对此进行限制。近场信号中可以包含考勤设备11的设备标识信息,以表明近场信号的发送方为该考勤设备11。信标设备通过发射上述的近场信号,指示手机12等电子设备在接收到该近场信号后,触发与该信标设备相关的预设功能,例如与考勤设备11相关的预设功能可以包括考勤功能、考勤设备的设置功能等;而考勤设备11仅为可以使用的一种类型的信标设备,比如信标设备还可以为门禁设备,则与该门禁设备相关的预设功能可以包括门禁开启功能、门禁设备的设置功能等,当然本申请并不对该信标设备的设备类型进行限制。信标设备可以运行某一应用的信标设备侧的程序,以实现该应用的相关业务功能,比如当该信标设备运行移动化团体办公平台的程序时,可以实现为该移动化团体办公平台的信标设备客户端,使得该信标设备11可以在该信标设备客户端的控制下发射近场信号。
手机12只是用户可以使用的一种类型的电子设备。实际上,用户显然还可以使用诸如下述类型的电子设备:平板设备、笔记本电脑、掌上电脑(PDAs,Personal Digital Assistants)、可穿戴设备(如智能眼镜、智能手表等)等,本申请并不对此进行限制。在运行过程中,该电子设备可以运行某一应用的客户端侧的程序,以实现该应用的相关业务功能,比如当该电子设备运行移动化团体办公平台的程序时,可以实现为该移动化团体办公平台的用户客户端,使得电设备可以检测与信标设备之间的距离、触发与信标设备相关的预设功能等。
同时,信标设备与电子设备之间还可以基于近场通讯技术建立无线通讯连接,电子设备可以基于该无线通讯连接与信标设备进行无线通讯。例如,当与考勤设备11相关的预设功能为考勤功能时,手机12可以通过与考勤设备11之间的无线通讯,使得考勤设备11可以记录下相应的考勤成功信息;或者,当与考勤设备11相关的预设功能为设置功能时,手机12可以将设置结果发送至考勤设备11,以使考勤设备11根据设置结果对自身进行功能配置。
其中,以移动化企业办公平台的用户客户端为例(同样适用于信标设备上的信标设备客户端等其他客户端),该用户客户端的应用程序可以被预先安装在手机12等电子设备上,使得该用户客户端可以在该手机12上被启动并运行;当然,当采用诸如HTML5技术的在线“客户端”时,无需在手机12上安装相应的应用程序,即可获得并运行该用户客户端。
图2是本申请一示例性实施例提供的另一种近场通讯系统的架构示意图。如图2所示,该系统可以包括服务器21、网络22、手机23等电子设备、考勤设备24等信标设备。
服务器21可以为包含一独立主机的物理服务器,或者该服务器21可以为主机集群承载的虚拟服务器,或者该服务器21可以为云服务器。在运行过程中,服务器21可以运行某一应用的服务器侧的程序,以实现该应用的相关业务功能,比如当该服务器21运行移动化团体办公平台的程序时,可以实现为该移动化团体办公平台的服务端。
网络22可以包括多种类型的有线或无线网络。在一实施例中,该网络22可以包括公共交换电话网络(Public Switched Telephone Network,PSTN)和因特网。手机23等电子设备、考勤设备24等信标设备可以分别通过该网络22与服务器21进行通讯交互。
因此,手机23等电子设备并不必须与考勤设备24等信标设备建立无线通讯连接,只需要由信标设备向外发射近场信号、电子设备接收该近场信号即可。以考勤设备24为例,当与考勤设备24相关的预设功能为设置功能时,手机23可以通过网络22将设置结果上传至服务器21,并由服务器21将设置结果或基于该设置结果的配置指令通过网络22推送至考勤设备24,以由考勤设备24根据该设置结果或配置指令对自身进行功能配置。
需要指出的是:本申请中的移动化企业办公平台是一种综合性平台,不仅可以实现通讯功能,还可以作为诸多其他功能的集成化功能平台,比如对于审批事件(如请假、办公物品申领、财务等审批事件)、考勤事件、任务事件、日志事件等企业内部事件的处理,再比如订餐、采购等企业外部事件的处理,本申请并不对此进行限制。例如,上述的考勤设备11或考勤设备24上运行的移动化企业办公平台的信标设备客户端可以实现考勤功能,即处理上述的考勤事件。
较为具体地,移动化企业办公平台可以承载于相关技术中的即时通讯应用,比如企业即时通讯(Enterprise Instant Messaging,EIM)应用,例如Skype For
Figure PCTCN2018085018-appb-000001
Microsoft
Figure PCTCN2018085018-appb-000002
Figure PCTCN2018085018-appb-000003
等。当然,即时通讯功能仅为移动化企业办公平台支持的通讯功能之一,该企业办公平台还能够实现更多诸如上述的其他功能,此处不再赘述。
基于上述图1或图2所示的近场通讯系统,在实施本申请的技术方案的过程中,主要涉及到在信标设备发射出近场信号后,电子设备对该近场信号的接收和处理过程,下面结合图3对该电子设备的处理逻辑进行描述。
图3是本申请一示例性实施例提供的一种近场触发功能的实现方法的流程图。如图3所示,该方法应用于电子设备上,可以包括以下步骤:
步骤302,确定电子设备是否进入信标设备周围的预设保护范围。
在本实施例中,电子设备可以接收所述信标设备发射的近场信号,并根据所述近场信号的信号强度,确定所述电子设备与所述信标设备之间的距离,且所述距离与所述信号强度呈负相关;然后,根据所述距离以及所述预设保护范围对应的保护距离、所述预设触发范围对应的触发距离,确定所述电子设备是否进入所述预设保护范围或所述预设触发范围。其中,信号强度可以为电子设备测量得到的RSSI(Received Signal Strength Indication,接收的信号强度指示)值,并根据预定义的RSSI值与距离之间的换算公式,计算得到电子设备与信标设备之间的距离。
在本实施例中,由于预设保护范围大于预设触发范围,相当于预设保护范围在预设触发范围的外围形成一圈“安全范围”,那么即便电子设备检测到的距离发生波动,只要该波动不超出预设保护范围,就不会对实际处理过程造成影响,比如电子设备不会反复触发与信标设备相关的预设功能。
其中,当用户(如管理人员)确实需要触发与信标设备相关的预设功能时,必然将电子设备置于预设触发范围内,因而可以确保预设保护范围与预设触发范围之间的相差距离,不小于电子设备检测到的距离的最大波动距离,即可确保该距离的数值波动完全不会造成电子设备的误判,完全避免电子设备反复触发与信标设备相关的预设功能。比如,假定预设保护范围为以信标设备的安装位置为圆心、r1为半径的圆形区域,预设触发范围为以信标设备的安装位置为圆心、r2为半径的圆形区域,当电子设备可能产生的最大波动距离为k时,只需要确保r1-r2≥k,即可确保电子设备实际尚未进入预设保护范围时不会波动至预设触发范围内、实际位于预设触发范围时不会波动出预设保护范围,防止电子设备误判为重新进入预设保护范围而导致重复触发上述的预设功能。
需要指出的是:在实际情况中,每一型号的电子设备对于近场信号的感应灵敏度存在一定差异,使其对于自身与信标设备之间的距离的测量结果也存在一定偏差。那么,为了适配于所有型号的电子设备,本申请的技术方案中只需要合理设置上述的预设保护范围与预设触发范围,比如确保上述的相差距离不小于所有电子设备可能产生的最大波动距离,
步骤304,在所述电子设备连续处于所述预设保护范围的时间段内,当所述电子设备首次进入预设触发范围时,触发预设功能。
在本实施例中,可以通过下述方式判断所述电子设备在所述时间段内是否首次进入所述预设触发范围:当所述电子设备从外部进入所述预设保护范围时,将功能触发状态设置为可触发;当所述电子设备进入所述预设触发范围时,若所述功能触发状态为可触 发,则确定所述电子设备在所述时间段内首次进入所述预设触发范围,并将所述功能触发状态切换为不可触发,从而确保电子设备每次连续处于预设保护范围内的时间段中,电子设备都仅能够在首次进入预设触发范围时触发与信标设备相关的预设功能,避免该预设功能的重复触发。
在本实施例中,可以由电子设备触发预设功能,也可以由电子设备上运行的预设应用程序触发该预设功能;例如,该预设应用程序可以为上述移动化企业办公平台的客户端程序。
在本实施例中,预设功能可以包括与信标设备相关的功能,当然本申请并不对此进行限制;例如,信标设备可以不存在相关联的功能,而仅用于触发上述的预设功能。在触发该预设功能时,电子设备可以展示出针对所述信标设备的功能触发界面,比如当该信标设备为考勤设备时,该功能触发界面可以为考勤触发界面,以便于用户通过触发该考勤触发界面而完成考勤操作。或者,电子设备可以展示出针对信标设备的功能设置界面,以对该信标设备进行功能设置,比如当该信标设备为考勤设备时,该功能设置界面可以用于输入需要考勤的人员的信息。
在本实施例中,当所述电子设备处于所述预设保护范围内时,可以在所述电子设备上展示与所述信标设备相关的预设功能的入口选项;其中,当检测到针对所述入口选项的用户触发操作时,可以在启动状态与中止状态之间对所述与所述信标设备相关的预设功能进行切换控制。那么,即便由于一些原因(比如用户误操作、电子设备波动至预设触发范围之外而自动关闭等)而导致与所述信标设备相关的预设功能或其操作界面被关闭,用户也可以通过对该入口选项进行触发,以实现对该预设功能或其操作界面的快速调用,有助于提升用户的操作效率。
由以上技术方案可见,本申请通过在信标设备周围同时设置预设保护范围和预设触发范围,并且仅在电子设备连续处于预设保护范围内的时间段内、首次进入预设触发范围时触发预设功能,使得即便电子设备检测到的距离发生数值波动时,也可以降低或消除电子设备的误判,避免反复触发与信标设备相关的预设功能。
为了便于理解,下面结合图2所示的近场通讯系统的技术架构,以企业即时通讯应用“企业微信”为例,对本申请的技术方案进行说明。假定手机23上运行有企业微信的用户客户端、考勤设备24上运行有企业微信的信标设备客户端、服务器21上运行有企业微信的服务端,其中手机23上的用户客户端分别登录有不同使用者的注册账号,例如手机23上登录有管理人员的注册账号,使得手机23被配置为管理人员对应的管理设备。 基于本申请的技术方案,管理人员可以通过手机23对考勤设备24进行功能设置等操作,下面结合图4对该具体过程进行详细描述。
图4是本申请一示例性实施例提供的一种对考勤设备进行设置的流程图。如图4所示,该流程可以包括以下步骤:
步骤402,考勤设备24向服务器21发送激活码获取请求。
步骤404,服务器21向考勤设备24分配激活码。
在本实施例中,考勤设备24开机后,可以检查存储空间中是否存在激活码;如果存在,可以直接转入步骤406B,否则可以向服务器21发送激活码获取请求,以使服务器21向考勤设备24分配唯一对应的激活码。由于激活码与考勤设备24之间唯一对应,因而可以将该激活码作为该考勤设备24的标识信息。
在本实施例中,考勤设备24接收到服务器21分配的激活码后,可以将该激活码保存至存储空间中,并且此后一直应用该激活码。或者,考勤设备24可以按照预设周期主动老化获得的激活码,并向服务器21重新请求新的激活码,那么服务器21可以使用该新的激活码来替换旧的激活码(即被老化的激活码),比如更新下述的激活码与该考勤设备24之间的对应关系。
步骤406A,服务器21存储考勤设备24与激活码之间的对应关系。
在本实施例中,在考勤设备24发送的激活码获取请求中,可以包含该考勤设备的MAC地址等,以作为该考勤设备的ID信息,使得服务器21可以在该ID信息与分配的激活码之间建立对应关系。
当然,对于激活码不需要更新变化的情况下,也可以事先将激活码写入到考勤设备24内部,以及将该激活码与该考勤设备24之间的对应关系存储于服务器21中,那么考勤设备24可以直接读取和应用该激活码,而无需通过上述步骤向服务器21请求获取激活码。
步骤406B,考勤设备24展示激活码。
在本实施例中,激活码可以为图5所示的二维码240(或其他形式的图形码),而考勤设备24可以直接显示出该二维码240。或者,激活码可以为一组字符串或其他形式的非图形信息,那么考勤设备24可以直接显示出该字符串,也可以对该字符串进行转换,并显示出转换得到的诸如图5所示的二维码240等。当然,激活码还可以采用其他形式,而考勤设备24也可以通过更多方式对该激活码进行显示,本申请并不对此进行限制。
步骤408,手机23从考勤设备24上读取激活码。
在本实施例中,手机23上安装有企业微信的用户客户端,该用户客户端可以通过获取考勤设备24展示的标识信息,读取考勤设备24上的激活码,而服务器21上已经存储有该标识信息与该考勤设备24之间的对应关系。
在一实施例中,当考勤设备24上的激活码为图形码形式时,可以通过用户客户端提供的“扫码”功能,启动手机23上的摄像头组件对该图形码进行采集,然后通过内容识别而读取激活码的内容;例如,通过对图5所示的二维码240进行读取后,可以识别出该二维码240对应的激活码为“gfd1s5g451f24sg54sg241fd1”。
在另一实施例中,当考勤设备24上的激活码为字符串形式时,可以通过该用户客户端提供的相关功能,启动手机23上的摄像头组件对该字符串进行采集,然后通过诸如OCR(Optical Character Recognition,光学字符识别)等方式识别该字符串。当然,用户客户端也可以示出输入框,使得用户可以将考勤设备24上示出的字符串手动输入至手机23中,帮助手机23完成对该字符串的读取操作。
步骤410,服务器21接收到手机23发送的绑定请求,该绑定请求中包含激活码。
步骤412,服务器21在手机23与考勤设备24之间建立绑定关系。
在本实施例中,手机23可以向服务器21发送针对标识信息的绑定请求,而服务器21提取该绑定请求中包含的标识信息,并根据在步骤406A中存储的对应关系确定该标识信息对应的考勤设备24,然后在该考勤设备24与该手机23之间建立绑定关系。
此处的“手机23”可以被狭义地认为是某台物理的用户设备,比如通过该用户设备的MAC地址等对其进行识别,或者该“手机23”也可以被广义地认为是登录有相应的注册账号的任意电子设备。为了便于理解,下面均以考勤设备24与注册账号进行绑定为例进行说明。
步骤414,在绑定成功后,手机23可以对考勤设备24的通告帧参数进行设定,并由服务器21根据设定结果而配置考勤设备24的通告帧参数。
步骤416,考勤设备24按照配置的通告帧参数,向外发射通告帧消息。
在本实施例中,假定考勤设备24采用基于BLE技术的ibeacon协议,该考勤设备24向外发射的近场信号可以为通告帧(Advertising)消息。
通告帧参数可以包括:考勤设备24的设备标识信息和消息发射参数。其中,设备标识信息用于使得诸如手机23等接收到通告帧消息时,据此确定该通告帧消息的发送方为考勤设备24;例如,该设备标识信息可以由通告帧消息中包含的UUID(Universally Unique Identifier,通用唯一识别码)、Major(主参数)、Minor(副参数)等共同表征。而消 息发射参数用于指示考勤设备24如何发射该通告帧消息,例如该消息发射参数可以包括发射功率、发射周期等,发射功率可以控制该通告帧消息的覆盖范围、发射周期可以控制该通告帧消息的发射频率。
在本实施例中,管理人员可以在激活考勤设备24的过程中,对考勤设备24的通告帧参数进行配置;当然,管理人员也可以在其他时刻对该通告帧参数进行配置。此外,可以由其他用户对该考勤设备24的通告帧参数进行配置。实际上,即便直接采用考勤设备24的出厂默认配置,仍然不影响该考勤设备24的使用。
步骤418,当管理人员将手机23携带至考勤设备24附近时,手机23可以接收到考勤设备24发射的通告帧消息。
步骤420,手机23识别出通告帧消息的发送方。
在本实施例中,手机23上运行的企业微信的用户客户端,可以对手机23接收到的通告帧消息进行解析。那么,用户客户端可以根据通告帧消息中包含的UUID、Major、Minor等参数的数值,识别出该通告帧消息的发送方为考勤设备24。其中,用户客户端的本地可以存储有管理人员具有管理权限的所有考勤设备对应的设备标识信息,使得该用户客户端可以在本地识别出通告帧消息的发送方为考勤设备24;或者,用户客户端可以将通告帧消息中的设备标识信息发送至服务器21,并接收服务器21返回的识别结果。
步骤422,手机23确定自身与考勤设备24之间的距离。
在本实施例中,手机23在接收到上述的通告帧消息时,可以检测出该通告帧消息的RSSI值;同时,手机23上运行的用户客户端预存储有RSSI值与距离之间的换算公式,例如该换算方式可以为d=10^((abs(RSSI)-A)/(10*n)),其中:d为手机23与考勤设备24之间的距离、RSSI为手机23检测出的RSSI值、A为通告帧消息的发射端与接收端在距离为1米时的RSSI值、n为环境衰减因子。简而言之,距离应当与RSSI值呈负相关。
步骤424,手机23确定是否满足预定义条件,并在满足时自动弹出针对考勤设备24的设置窗口。
在本实施例中,考勤设备24周围可以形成多个范围;如图6所示,包括:以考勤设备24的安装位置为圆心、预设保护距离r1为半径的预设保护范围61,以考勤设备24的安装位置为圆心、预设触发距离r2为半径的预设触发范围62,其中r1>r2,即预设保护范围61的覆盖范围大于预设触发范围62。那么,对于考勤设备24而言,通告帧消息的发射功率应当使其自身的覆盖范围至少大于预设保护范围61,手机23才能够基于上述的预设保护范围61、预设触发范围62等,确定是否满足预定义条件。
如图6所示,手机23在预设保护范围61之外的某一位置接收到通告帧消息,假定此时手机23与考勤设备24之间的实际距离为d1。但是,由于近场信号的稳定性、手机23上的蓝牙模块的灵敏度等原因,导致手机23计算得到的距离可能存在一定的偏差a,使得手机23计算出的自身位置可能处于图6所示的以手机23的实际位置为圆心、偏差a为半径的波动范围63内,相应的检测距离归属区间[d1-a,d1+a]。
当手机23进一步朝向考勤设备24移动时,假定手机23移动至图7所示的位置,即手机23实际上位于预设保护范围61内,但是手机23的波动范围63并未完全位于该预设保护范围61内、存在部分区域位于预设保护范围61之外,使得手机23检测出的距离可能导致下述两种结果:(1)位于预设保护范围61之外、(2)位于预设保护范围61内、位于预设触发范围62之外,并且可能在上述两种结果之间来回切换,仿佛手机23不断进入和离开预设保护范围61。
假定上述的预定义条件为:手机23在每次连续处于该预设保护范围61的时间段内,首次进入预设触发范围62。那么,对于图7所示的实施例而言,当手机23在T1时刻检测到由上述的结果(1)切换至结果(2)时,表明手机23进入预设保护范围61,那么直至该手机23在T2时刻由结果(2)切换回结果(1)为止,即在该T1时刻与T2时刻之间的时间段中,如果手机23首次进入了预设触发范围62,就确定手机23满足了上述的预定义条件,而如果在该时间段内未进入预设触发范围62或者非首次进入预设触发范围62,则确定手机23未满足该预定义条件。
因此,对于图7所示的实施例而言,无论是结果(1)或结果(2),手机23始终未能够进入预设触发范围62,从而未满足上述的预定义条件,不会触发设置窗口。而当手机23进一步靠近考勤设备24时,比如图8所示,假定手机23的波动范围63的至少一部分进入预设触发范围62,且手机23根据检测到的距离判定自身已经进入预设触发范围62,那么:如果本次为手机23在同一时间段内首次进入预设触发范围62,可以确定手机23满足上述的预定义条件,使得手机23可以在图9所示的用户客户端的显示界面91上自动弹出设置窗口92,以由管理人员对考勤设备24进行设置。
实际上,在图8所示的实施例中,与图7所示实施例相类似的,由于波动范围63的一部分位于预设触发范围62内、另一部分位于预设触发范围62之外,使得手机23检测出的距离可能导致下述两种结果:(2)位于预设保护范围61内、位于预设触发范围62之外、(3)位于预设触发范围62内。那么,手机23在判定自身首次处于结果(3)之后,可以自动弹出上述的设置窗口92;以及,手机23可能在上述的结果(3)与结果(2) 之间来回切换,仿佛手机23不断进入和离开预设触发范围62,但是由于上述的预定义条件为“首次进入预设触发范围62”,所以手机23除了判定自身首次处于结果(3)之外,其他由结果(2)切换至结果(3)的情况均被判定为不满足上述的预定义条件,从而不会导致设置窗口92被频繁弹出,避免影响管理人员对考勤设备24的设置操作。
为了完全避免手机23频繁弹出设置窗口92,应当根据该手机23的波动范围63,恰当地设定预设保护范围61与预设触发范围62。如图10所示,对于波动范围63而言,可能导致的最大波动距离为k=2a,那么当预设保护距离r1与预设触发距离r2之间的相差距离r1-r2<k时,会导致手机23可能出现图10所示的情况:波动范围63的一部分位于预设触发范围62内(此时必然位于预设保护范围61内)、一部分位于预设保护范围61之外,导致手机23可能误判为自身不断由外部进入预设保护范围61和预设触发范围62、由预设触发范围62和预设保护范围61移动至外部,造成手机23误判为自身反复满足上述的预定义条件,使得手机23上反复弹出设置窗口92。因此,类似于图7和图8所示的情况,通过设定r1-r2≥k,可以确保波动范围63不会同时位于预设触发范围62内和预设保护范围61之外,避免手机23频繁弹出设置窗口92。
此外,管理人员在通过手机23对考勤设备24进行设置的过程中,可能由于一些原因导致其关闭了设置窗口92,使得管理人员可能需要人为地将手机23移动至预设保护范围61之外,然后重新进入预设触发范围62以弹出该设置窗口92。还有一些情况下,管理人员可能无法或不便于将手机23移动至预设保护范围61内。总之,上述情况可能对管理人员造成操作不便。因此,当电子设备处于预设保护范围61内时,如图11所示,手机23可以在用户客户端的显示界面1101上展示出针对该设置窗口92的入口选项1102,使得管理人员通过触发该入口选项1102,即可唤出设置窗口92或关闭已唤出的设置窗口92,以便于管理人员的操作。而当手机23移出预设保护范围61后,手机23可以隐藏入口选项1102,以避免管理人员误操作。
步骤426,手机23根据检测到的用户设置操作,生成针对考勤设备24的用户设置指令,并发送至服务器21。
步骤428,服务器21根据用户设置指令,对考勤设备进行配置。
综上所述,本申请通过设置预设保护范围61和预设触发范围62,以及与这两个范围相关的预定义条件,可以准确判定管理人员的操作意图,从而在手机23无法准确检测出自身与考勤设备24之间的距离的情况下,仍然能够确保手机23主动弹出针对考勤设备24的设置窗口92,并避免该设置窗口92被反复弹出,防止影响管理人员对考勤设备 24的设置操作。
图12是本申请一示例性实施例提供的另一种近场触发功能的实现方法的流程图。如图12所示,该方法应用于电子设备上,可以包括以下步骤:
步骤1202,确定电子设备是否进入信标设备周围的预设保护范围。
在本实施例中,步骤1202可以参考图3所示实施例中的步骤302,此处不再赘述。
步骤1204,在所述电子设备处于所述预设保护范围内并且当所述电子设备首次进入预设触发范围时,触发预设功能,其中所述预设保护范围大于所述预设触发范围。
在本实施例中,对于预设保护范围与预设触发范围之间的数值关系,以及对于预设保护范围与预设触发范围的设定,可以参考诸如图3或图4等上述实施例中的描述,此处不再赘述。
在本实施例中,当电子设备处于预设保护范围内时,表明该电子设备的使用者具有较大概率希望触发预设功能;而当该使用者进入预设触发范围时,可以确定该使用者确实希望触发该预设功能,从而通过在使用者首次进入该预设触发范围时触发该预设功能,一方面可以满足该使用者对于该预设功能的触发意愿,另一方面可以避免对该预设功能的反复触发。
图13是本申请一示例性实施例提供的又一种近场触发功能的实现方法的流程图。如图13所示,该方法应用于电子设备上,可以包括以下步骤:
步骤1302,确定电子设备是否进入考勤设备周围的预设保护范围。
在本实施例中,步骤1302可以参考图3所示实施例中的步骤302,仅将步骤302中的信标设备替换为步骤1302中的考勤设备,但采用的原理相同,此处不再赘述。
步骤1304,在所述电子设备处于所述预设保护范围内并且当所述电子设备首次进入预设触发范围时,在所述电子设备上展示出针对所述考勤设备的功能设置界面,其中所述预设保护范围大于所述预设触发范围。
在本实施例中,对于预设保护范围与预设触发范围之间的数值关系,以及对于预设保护范围与预设触发范围的设定,可以参考诸如图3或图4等上述实施例中的描述,此处不再赘述。
在本实施例中,当电子设备处于预设保护范围内时,表明该电子设备的使用者具有较大概率希望对考勤设备进行设置;而当该使用者进入预设触发范围时,可以确定该使用者确实希望对考勤设备进行设置,从而通过在使用者首次进入该预设触发范围时弹出对考勤设备的功能设置界面并展示于电子设备上,一方面可以满足该使用者对于考勤设 备的设置意愿,另一方面可以避免对功能设置界面的反复弹出,避免影响使用者对该功能设置界面的正常操作。
图14示出了根据本申请的一示例性实施例的电子设备的示意结构图。请参考图14,在硬件层面,该电子设备包括处理器1402、内部总线1404、网络接口1406、内存1408以及非易失性存储器1410,当然还可能包括其他业务所需要的硬件。处理器1402从非易失性存储器1410中读取对应的计算机程序到内存1408中然后运行,在逻辑层面上形成近场触发功能的实现装置。当然,除了软件实现方式之外,本申请并不排除其他实现方式,比如逻辑器件抑或软硬件结合的方式等等,也就是说以下处理流程的执行主体并不限定于各个逻辑单元,也可以是硬件或逻辑器件。
请参考图15,在软件实施方式中,该近场触发功能的实现装置可以包括:
确定单元1501,确定电子设备是否进入信标设备周围的预设保护范围;
触发单元1502,在所述电子设备连续处于所述预设保护范围的时间段内,当所述电子设备首次进入预设触发范围时,触发预设功能,其中所述预设保护范围大于所述预设触发范围。
可选的,所述确定单元1501通过下述方式确定所述电子设备是否进入所述预设保护范围或所述预设触发范围:
接收所述信标设备发射的近场信号;
根据所述近场信号的信号强度,确定所述电子设备与所述信标设备之间的距离,其中所述距离与所述信号强度呈负相关;
根据所述距离以及所述预设保护范围对应的保护距离、所述预设触发范围对应的触发距离,确定所述电子设备是否进入所述预设保护范围或所述预设触发范围。
可选的,所述触发单元1502通过下述方式判断所述电子设备在所述时间段内是否首次进入所述预设触发范围:
当所述电子设备从外部进入所述预设保护范围时,将功能触发状态设置为可触发;
当所述电子设备进入所述预设触发范围时,若所述功能触发状态为可触发,则确定所述电子设备在所述时间段内首次进入所述预设触发范围,并将所述功能触发状态切换为不可触发。
可选的,所述预设保护范围与所述预设触发范围之间的相差距离,不小于所述距离的最大波动距离。
可选的,所述触发单元1502具体用于:
在所述电子设备上展示出针对所述信标设备的功能触发界面或功能设置界面。
可选的,还包括:
展示单元1503,当所述电子设备处于所述预设保护范围内时,在所述电子设备上展示与所述信标设备相关的预设功能的入口选项;
切换单元1504,当检测到针对所述入口选项的用户触发操作时,在启动状态与中止状态之间对所述与所述信标设备相关的预设功能进行切换控制。
可选的,所述触发单元1502具体用于:
由所述电子设备触发所述预设功能;
或者,由所述电子设备上运行的预设应用程序触发所述预设功能。
可选的,所述预设功能包括:与所述信标设备相关的功能。
请参考图16,在软件实施方式中,该近场触发功能的实现装置可以包括:
确定单元1601,确定电子设备是否进入信标设备周围的预设保护范围;
触发单元1602,在所述电子设备处于所述预设保护范围内并且当所述电子设备首次进入预设触发范围时,触发预设功能,其中所述预设保护范围大于所述预设触发范围。
可选的,所述确定单元1601通过下述方式确定所述电子设备是否进入所述预设保护范围或所述预设触发范围:
接收所述信标设备发射的近场信号;
根据所述近场信号的信号强度,确定所述电子设备与所述信标设备之间的距离,其中所述距离与所述信号强度呈负相关;
根据所述距离以及所述预设保护范围对应的保护距离、所述预设触发范围对应的触发距离,确定所述电子设备是否进入所述预设保护范围或所述预设触发范围。
可选的,所述触发单元1602通过下述方式判断所述电子设备在所述预设保护范围内时是否首次进入所述预设触发范围:
当所述电子设备从外部进入所述预设保护范围时,将功能触发状态设置为可触发;
当所述电子设备进入所述预设触发范围时,若所述功能触发状态为可触发,则确定所述电子设备在所述预设保护范围内时首次进入所述预设触发范围,并将所述功能触发状态切换为不可触发。
可选的,所述预设保护范围与所述预设触发范围之间的相差距离,不小于所述距离的最大波动距离。
可选的,所述触发单元1602具体用于:
在所述电子设备上展示出针对所述信标设备的功能触发界面或功能设置界面。
可选的,还包括:
展示单元1603,当所述电子设备处于所述预设保护范围内时,在所述电子设备上展示与所述信标设备相关的预设功能的入口选项;
切换单元1604,当检测到针对所述入口选项的用户触发操作时,在启动状态与中止状态之间对所述与所述信标设备相关的预设功能进行切换控制。
可选的,所述触发单元1602具体用于:
由所述电子设备触发所述预设功能;
或者,由所述电子设备上运行的预设应用程序触发所述预设功能。
可选的,所述预设功能包括:与所述信标设备相关的功能。
请参考图17,在软件实施方式中,该近场触发功能的实现装置可以包括:
确定单元1701,确定电子设备是否进入考勤设备周围的预设保护范围;
展示单元1702,在所述电子设备处于所述预设保护范围内并且当所述电子设备首次进入预设触发范围时,在所述电子设备上展示出针对所述考勤设备的功能设置界面,其中所述预设保护范围大于所述预设触发范围。
可选的,所述确定单元1701通过下述方式确定所述电子设备是否进入所述预设保护范围或所述预设触发范围:
接收所述考勤设备发射的近场信号;
根据所述近场信号的信号强度,确定所述电子设备与所述考勤设备之间的距离,其中所述距离与所述信号强度呈负相关;
根据所述距离以及所述预设保护范围对应的保护距离、所述预设触发范围对应的触发距离,确定所述电子设备是否进入所述预设保护范围或所述预设触发范围。
可选的,所述展示单元1702通过下述方式判断所述电子设备在所述预设保护范围内时是否首次进入所述预设触发范围:
当所述电子设备从外部进入所述预设保护范围时,将所述功能设置界面的触发状态设置为可触发;
当所述电子设备进入所述预设触发范围时,若所述触发状态为可触发,则确定所述电子设备在所述预设保护范围内时首次进入所述预设触发范围,并将所述触发状态切换为不可触发。
可选的,所述预设保护范围与所述预设触发范围之间的相差距离,不小于所述距离 的最大波动距离。
可选的,
所述展示单元1702还用于:当所述电子设备处于所述预设保护范围内时,在所述电子设备上展示所述功能设置界面的入口选项;
所述装置还包括:切换单元1703,当检测到针对所述入口选项的用户触发操作时,在展示状态与隐藏状态之间对所述功能设置界面进行切换控制。
可选的,所述展示单元1702具体用于:
由所述电子设备触发所述功能设置界面的展示;
或者,由所述电子设备上运行的预设应用程序触发所述功能设置界面的展示。
上述实施例阐明的系统、装置、模块或单元,具体可以由计算机芯片或实体实现,或者由具有某种功能的产品来实现。一种典型的实现设备为计算机,计算机的具体形式可以是个人计算机、膝上型计算机、蜂窝电话、相机电话、智能电话、个人数字助理、媒体播放器、导航设备、电子邮件收发设备、游戏控制台、平板计算机、可穿戴设备或者这些设备中的任意几种设备的组合。
在一个典型的配置中,计算机包括一个或多个处理器(CPU)、输入/输出接口、网络接口和内存。
内存可能包括计算机可读介质中的非永久性存储器,随机存取存储器(RAM)和/或非易失性内存等形式,如只读存储器(ROM)或闪存(flash RAM)。内存是计算机可读介质的示例。
计算机可读介质包括永久性和非永久性、可移动和非可移动媒体可以由任何方法或技术来实现信息存储。信息可以是计算机可读指令、数据结构、程序的模块或其他数据。计算机的存储介质的例子包括,但不限于相变内存(PRAM)、静态随机存取存储器(SRAM)、动态随机存取存储器(DRAM)、其他类型的随机存取存储器(RAM)、只读存储器(ROM)、电可擦除可编程只读存储器(EEPROM)、快闪记忆体或其他内存技术、只读光盘只读存储器(CD-ROM)、数字多功能光盘(DVD)或其他光学存储、磁盒式磁带,磁带磁磁盘存储或其他磁性存储设备或任何其他非传输介质,可用于存储可以被计算设备访问的信息。按照本文中的界定,计算机可读介质不包括暂存电脑可读媒体(transitory media),如调制的数据信号和载波。
还需要说明的是,术语“包括”、“包含”或者其任何其他变体意在涵盖非排他性的包含,从而使得包括一系列要素的过程、方法、商品或者设备不仅包括那些要素,而 且还包括没有明确列出的其他要素,或者是还包括为这种过程、方法、商品或者设备所固有的要素。在没有更多限制的情况下,由语句“包括一个……”限定的要素,并不排除在包括所述要素的过程、方法、商品或者设备中还存在另外的相同要素。
这里将详细地对示例性实施例进行说明,其示例表示在附图中。下面的描述涉及附图时,除非另有表示,不同附图中的相同数字表示相同或相似的要素。以下示例性实施例中所描述的实施方式并不代表与本申请相一致的所有实施方式。相反,它们仅是与如所附权利要求书中所详述的、本申请的一些方面相一致的装置和方法的例子。
在本申请使用的术语是仅仅出于描述特定实施例的目的,而非旨在限制本申请。在本申请和所附权利要求书中所使用的单数形式的“一种”、“所述”和“该”也旨在包括多数形式,除非上下文清楚地表示其他含义。还应当理解,本文中使用的术语“和/或”是指并包含一个或多个相关联的列出项目的任何或所有可能组合。
应当理解,尽管在本申请可能采用术语第一、第二、第三等来描述各种信息,但这些信息不应限于这些术语。这些术语仅用来将同一类型的信息彼此区分开。例如,在不脱离本申请范围的情况下,第一信息也可以被称为第二信息,类似地,第二信息也可以被称为第一信息。取决于语境,如在此所使用的词语“如果”可以被解释成为“在……时”或“当……时”或“响应于确定”。
以上所述仅为本申请的较佳实施例而已,并不用以限制本申请,凡在本申请的精神和原则之内,所做的任何修改、等同替换、改进等,均应包含在本申请保护的范围之内。

Claims (20)

  1. 一种近场触发功能的实现方法,其特征在于,包括:
    确定电子设备是否进入信标设备周围的预设保护范围;
    在所述电子设备连续处于所述预设保护范围的时间段内,当所述电子设备首次进入预设触发范围时,触发预设功能,其中所述预设保护范围大于所述预设触发范围。
  2. 根据权利要求1所述的方法,其特征在于,通过下述方式确定所述电子设备是否进入所述预设保护范围或所述预设触发范围,包括:
    接收所述信标设备发射的近场信号;
    根据所述近场信号的信号强度,确定所述电子设备与所述信标设备之间的距离,其中所述距离与所述信号强度呈负相关;
    根据所述距离以及所述预设保护范围对应的保护距离、所述预设触发范围对应的触发距离,确定所述电子设备是否进入所述预设保护范围或所述预设触发范围。
  3. 根据权利要求1所述的方法,其特征在于,通过下述方式判断所述电子设备在所述时间段内是否首次进入所述预设触发范围:
    当所述电子设备从外部进入所述预设保护范围时,将功能触发状态设置为可触发;
    当所述电子设备进入所述预设触发范围时,若所述功能触发状态为可触发,则确定所述电子设备在所述时间段内首次进入所述预设触发范围,并将所述功能触发状态切换为不可触发。
  4. 根据权利要求1所述的方法,其特征在于,所述预设保护范围与所述预设触发范围之间的相差距离,不小于所述距离的最大波动距离。
  5. 根据权利要求1所述的方法,其特征在于,所述触发预设功能,包括:
    在所述电子设备上展示出针对所述信标设备的功能触发界面或功能设置界面。
  6. 根据权利要求1所述的方法,其特征在于,还包括:
    当所述电子设备处于所述预设保护范围内时,在所述电子设备上展示与所述信标设备相关的预设功能的入口选项;
    当检测到针对所述入口选项的用户触发操作时,在启动状态与中止状态之间对所述与所述信标设备相关的预设功能进行切换控制。
  7. 根据权利要求1所述的方法,其特征在于,所述触发预设功能,包括:
    由所述电子设备触发所述预设功能;
    或者,由所述电子设备上运行的预设应用程序触发所述预设功能。
  8. 根据权利要求1所述的方法,其特征在于,所述预设功能包括:与所述信标设备相关的功能。
  9. 一种近场触发功能的实现装置,其特征在于,包括:
    确定单元,确定电子设备是否进入信标设备周围的预设保护范围;
    触发单元,在所述电子设备连续处于所述预设保护范围的时间段内,当所述电子设备首次进入预设触发范围时,触发预设功能,其中所述预设保护范围大于所述预设触发范围。
  10. 根据权利要求9所述的装置,其特征在于,所述确定单元通过下述方式确定所述电子设备是否进入所述预设保护范围或所述预设触发范围:
    接收所述信标设备发射的近场信号;
    根据所述近场信号的信号强度,确定所述电子设备与所述信标设备之间的距离,其中所述距离与所述信号强度呈负相关;
    根据所述距离以及所述预设保护范围对应的保护距离、所述预设触发范围对应的触发距离,确定所述电子设备是否进入所述预设保护范围或所述预设触发范围。
  11. 根据权利要求9所述的装置,其特征在于,所述触发单元通过下述方式判断所述电子设备在所述时间段内是否首次进入所述预设触发范围:
    当所述电子设备从外部进入所述预设保护范围时,将功能触发状态设置为可触发;
    当所述电子设备进入所述预设触发范围时,若所述功能触发状态为可触发,则确定所述电子设备在所述时间段内首次进入所述预设触发范围,并将所述功能触发状态切换为不可触发。
  12. 根据权利要求9所述的装置,其特征在于,所述预设保护范围与所述预设触发范围之间的相差距离,不小于所述距离的最大波动距离。
  13. 根据权利要求9所述的装置,其特征在于,所述触发单元具体用于:
    在所述电子设备上展示出针对所述信标设备的功能触发界面或功能设置界面。
  14. 根据权利要求9所述的装置,其特征在于,还包括:
    展示单元,当所述电子设备处于所述预设保护范围内时,在所述电子设备上展示与所述信标设备相关的预设功能的入口选项;
    切换单元,当检测到针对所述入口选项的用户触发操作时,在启动状态与中止状态之间对所述与所述信标设备相关的预设功能进行切换控制。
  15. 根据权利要求9所述的装置,其特征在于,所述触发单元具体用于:
    由所述电子设备触发所述预设功能;
    或者,由所述电子设备上运行的预设应用程序触发所述预设功能。
  16. 根据权利要求9所述的装置,其特征在于,所述预设功能包括:与所述信标设备相关的功能。
  17. 一种近场触发功能的实现方法,其特征在于,包括:
    确定电子设备是否进入信标设备周围的预设保护范围;
    在所述电子设备处于所述预设保护范围内并且当所述电子设备首次进入预设触发范围时,触发预设功能,其中所述预设保护范围大于所述预设触发范围。
  18. 一种近场触发功能的实现装置,其特征在于,包括:
    确定单元,确定电子设备是否进入信标设备周围的预设保护范围;
    触发单元,在所述电子设备处于所述预设保护范围内并且当所述电子设备首次进入预设触发范围时,触发预设功能,其中所述预设保护范围大于所述预设触发范围。
  19. 一种近场触发功能的实现方法,其特征在于,包括:
    确定电子设备是否进入考勤设备周围的预设保护范围;
    在所述电子设备处于所述预设保护范围内并且当所述电子设备首次进入预设触发范围时,在所述电子设备上展示出针对所述考勤设备的功能设置界面,其中所述预设保护范围大于所述预设触发范围。
  20. 一种近场触发功能的实现装置,其特征在于,包括:
    确定单元,确定电子设备是否进入考勤设备周围的预设保护范围;
    展示单元,在所述电子设备处于所述预设保护范围内并且当所述电子设备首次进入预设触发范围时,在所述电子设备上展示出针对所述考勤设备的功能设置界面,其中所述预设保护范围大于所述预设触发范围。
PCT/CN2018/085018 2017-05-08 2018-04-28 近场触发功能的实现方法及装置 WO2018205860A1 (zh)

Applications Claiming Priority (2)

Application Number Priority Date Filing Date Title
CN201710317973.1 2017-05-08
CN201710317973.1A CN108882207B (zh) 2017-05-08 2017-05-08 近场触发功能的实现方法及装置

Publications (1)

Publication Number Publication Date
WO2018205860A1 true WO2018205860A1 (zh) 2018-11-15

Family

ID=64105216

Family Applications (1)

Application Number Title Priority Date Filing Date
PCT/CN2018/085018 WO2018205860A1 (zh) 2017-05-08 2018-04-28 近场触发功能的实现方法及装置

Country Status (2)

Country Link
CN (1) CN108882207B (zh)
WO (1) WO2018205860A1 (zh)

Cited By (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN109636934A (zh) * 2018-11-30 2019-04-16 歌尔股份有限公司 一种考勤方法、装置和可穿戴设备

Families Citing this family (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN109636936B (zh) * 2018-12-12 2021-05-28 泰康保险集团股份有限公司 一种考勤系统、方法、介质和电子设备
CN111429595B (zh) * 2020-03-20 2022-06-07 Oppo广东移动通信有限公司 一种考勤管理方法、装置及计算机可读存储介质

Citations (7)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
WO2013089779A1 (en) * 2011-12-16 2013-06-20 Intel Corporation Connection and synchronization with a device in a non-active state based on near field communication
EP2725851A2 (en) * 2012-10-25 2014-04-30 BlackBerry Limited System and method of rejecting a low power state based on a cover detection by a mobile wireless communication device
CN104834880A (zh) * 2015-05-07 2015-08-12 惠州Tcl移动通信有限公司 一种基于nfc移动终端的卡检测方法及系统
US9532226B2 (en) * 2013-06-07 2016-12-27 Blackberry Limited Mobile wireless communications device performing device unlock based upon near field communication (NFC) and related methods
CN106303926A (zh) * 2016-08-23 2017-01-04 Tcl移动通信科技(宁波)有限公司 一种基于移动终端的接近传感器数据处理方法及系统
CN106331376A (zh) * 2016-09-30 2017-01-11 维沃移动通信有限公司 一种省电方法及移动终端
US20170013458A1 (en) * 2013-10-11 2017-01-12 Mediatek Inc. Electronic devices and method for near field communication between two electronic devices

Family Cites Families (11)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US8836580B2 (en) * 2005-05-09 2014-09-16 Ehud Mendelson RF proximity tags providing indoor and outdoor navigation and method of use
CN102215051B (zh) * 2010-04-02 2013-08-28 国民技术股份有限公司 一种利用低频磁通信的射频sim卡启动交易的距离门限判断方法
US8810454B2 (en) * 2011-10-13 2014-08-19 Microsoft Corporation Power-aware tiered geofencing and beacon watchlists
US9191832B2 (en) * 2013-06-06 2015-11-17 Apple Inc. Category-based fence
CN104299279A (zh) * 2013-07-20 2015-01-21 郑州学生宝电子科技有限公司 基于射频技术的学生专用电子考勤系统
CN105279808A (zh) * 2014-05-26 2016-01-27 中兴通讯股份有限公司 一种签到方法、装置和签到服务器
CN104376340B (zh) * 2014-08-29 2016-06-22 腾讯科技(深圳)有限公司 打卡方法及装置
CN104574555B (zh) * 2015-01-14 2017-07-07 四川大学 基于稀疏表示的人脸分类算法的远距离考勤方法
CN105228093B (zh) * 2015-10-14 2019-02-15 郑州大学 基于低功耗蓝牙的智能移动终端管控系统
CN105578418A (zh) * 2016-02-25 2016-05-11 成都比善科技开发有限公司 一种用于工业领域的无线电子围栏系统
CN105957169B (zh) * 2016-04-19 2018-05-11 唐山新质点科技有限公司 一种基于ibeacon技术的检测方法、装置及系统

Patent Citations (7)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
WO2013089779A1 (en) * 2011-12-16 2013-06-20 Intel Corporation Connection and synchronization with a device in a non-active state based on near field communication
EP2725851A2 (en) * 2012-10-25 2014-04-30 BlackBerry Limited System and method of rejecting a low power state based on a cover detection by a mobile wireless communication device
US9532226B2 (en) * 2013-06-07 2016-12-27 Blackberry Limited Mobile wireless communications device performing device unlock based upon near field communication (NFC) and related methods
US20170013458A1 (en) * 2013-10-11 2017-01-12 Mediatek Inc. Electronic devices and method for near field communication between two electronic devices
CN104834880A (zh) * 2015-05-07 2015-08-12 惠州Tcl移动通信有限公司 一种基于nfc移动终端的卡检测方法及系统
CN106303926A (zh) * 2016-08-23 2017-01-04 Tcl移动通信科技(宁波)有限公司 一种基于移动终端的接近传感器数据处理方法及系统
CN106331376A (zh) * 2016-09-30 2017-01-11 维沃移动通信有限公司 一种省电方法及移动终端

Cited By (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN109636934A (zh) * 2018-11-30 2019-04-16 歌尔股份有限公司 一种考勤方法、装置和可穿戴设备

Also Published As

Publication number Publication date
CN108882207B (zh) 2022-04-22
CN108882207A (zh) 2018-11-23

Similar Documents

Publication Publication Date Title
EP3358793B1 (en) Method for providing notification and electronic device thereof
US20220253912A1 (en) Location Triggered Processes
US20200287991A1 (en) Monitoring a computing device to automatically obtain data in response to detecting background activity
JP6546315B2 (ja) 近距離情報伝送
KR102390046B1 (ko) IoT 장치의 무선 라우터 연결을 지원하는 무선 라우터, 전자 장치 및 시스템
US20170230236A1 (en) Function synchronization method and electronic device for supporting the same
WO2018205970A1 (zh) 身份认证方法、装置和系统
KR102346062B1 (ko) 설정 정보 전송을 위한 전자 장치 및 그 동작 방법
AU2015223089A1 (en) Performing actions associated with individual presence
WO2018205860A1 (zh) 近场触发功能的实现方法及装置
US20150004903A1 (en) Chipless Near Field-Communication for Mobile Devices
US10034151B2 (en) Method for providing point of interest and electronic device thereof
EP3127060A1 (en) System and method for updating notifications across devices and applications
EP3322151B1 (en) Data transmission method and electronic device for supporting the same
US20190026506A1 (en) Tracking device wireless preconfiguration
CN114616813A (zh) 用于配对的用户计算设备的电话会议接口和控件
CN110463169B (zh) 用于显示呼叫相关信息的电子装置及其操作方法
WO2018149306A1 (zh) 事件处理方法及装置
US10631349B2 (en) Application-triggered tethering
US20180268383A1 (en) Electronic device and method for detecting item in data associated with web
US20210168556A1 (en) Electronic device and method for providing geofencing service
EP3414527B1 (en) Electronic device and method for providing route information
US10931681B2 (en) Securing resources
US11830014B2 (en) Method for receiving merchant information and electronic device using same
US11336714B1 (en) Queue-based distributed timer

Legal Events

Date Code Title Description
121 Ep: the epo has been informed by wipo that ep was designated in this application

Ref document number: 18798559

Country of ref document: EP

Kind code of ref document: A1

NENP Non-entry into the national phase

Ref country code: DE

122 Ep: pct application non-entry in european phase

Ref document number: 18798559

Country of ref document: EP

Kind code of ref document: A1